quick reference guide, 2017 - constant...
TRANSCRIPT
Savvy Cybersecurity Quick Reference Guide, 2015
Check with your financial advisor for updates.Copyright © 2017 Horsesmouth, LLC. All Rights Reserved.
Horsesmouth is an independent organization providing unique, unbiased insight into the critical issues facing financial advisors and their clients. Horsesmouth, LLC is not affiliated with the reprint licensee or any of its affiliates.
Answer Yes or No to the following questions. When complete, follow directions at bottom to get your raw score and rating. Then review checklist and complete action plan.
Question Yes/NoI have one email address that I use exclusively for my online financial accounts (banking, credit cards, payment services, brokerage, etc.) and nothing else.
I have two-step login (two-factor authentication) turned on for my email and online financial accounts.
I can spot the difference between dangerous free public Wi-Fi and useful, secure free public Wi-Fi.I understand how to tell if my home Wi-Fi network is vulnerable to hackers and how to boost the network’s security.
Whenever any money leaves my bank accounts or my credit cards are charged, I’m alerted to the transaction.
I have complete control over my credit files at the big-three bureaus (Equifax, Experian, and TransUnion), because I have placed them on the highest security level.
I have confirmed with the credit bureaus that my minor children have not been the victims of identity theft.
I run an updated antivirus software program on my computers and devices.
I always make sure that my computer and devices have the most up-to-date software programs, including operating system, browsers, Microsoft Office, iTunes player, virus protection, wireless router, and Adobe’s PDF reader.I have a system for ensuring that I can recover from a ransomware phishing attack without paying an extortion fee to a criminal.
Give yourself five points for each question answered with a Yes. Add points to get score. Consult section B to get your cybsersecurity rating.
RawScore:
50-40 GOOD
35-25 OKAY
20-0 DANGER
Consult the Checklist in section C to identify key items to include in your Action Plan in section D.
Action TimeEmail
� Create a secret email address for your financial accounts and set it up with the strongest possible security settings.
5 min
Passwords � Create stronger passwords using mnemonic, goal-setting, or poetic password
approaches. � Enable two-step verification on all your key accounts that allow it—financial
accounts and personal email. � Download a password manager and put it on all your computers and devices. Pick a
strong master password using the mnemonic or poetic approach.
5 min
5 min
15 min
Wi-Fi � Install a VPN program on your laptop and mobile devices for safe use of free Wi-Fi. � Change your router’s default username and password—don’t keep the factory
settings. � Select the WPA or WPA2 encryption setting. � Disable the WPS setting on your router. � Update your router’s software.
10 min15 min
5 min5 min
20 minTransactions
� Create text or email alerts for your bank accounts and credit cards. 2 minCredit
� Place a Security Freeze on your credit files at all three reporting agencies: Equifax, Experian, and TransUnion.
� Request a search on your children’s Social Security numbers at all three credit bureaus.
� Review your state’s laws to determine the best way to protect your children from identity theft.
20 min
30 min
15 min
Software � Update all software on all devices. � Set auto-update for programs that allow it. � Run an antivirus software.
10 min5 min5 min
Back-Up � Back up your data on ALL your devices to at least two locations—the cloud and a
physical device. 20 min
C. Checklist
Quick Reference Guide, 2017
B. Rating
A. Scorecard
Reginald Armstrong, CPWA®PresidentArmstrong Wealth Management Group1807 West Evans Street, Suite AFlorence, SC 29501
License #: 4636211 Reprint Licensee: Reginald Armstrong
Copyright © 2017 Horsesmouth, LLC. All Rights Reserved. Check with your financial advisor for updates.
I commit to taking the following steps to boost my cybersecurity by this date: ____/____/____
1.
2.
3.
Signature:
TAKE CHARGE TODAY
Learn the New Cybersecurity Rules and regain control of your online security. Hack-Proof Your Life Now! is the cybersecurity survival guide for everyone.
This book will guide you through all the actions included in the above checklist with detailed instructions.
It also includes recommendations for products such as password managers and antivirus software.
Get your copy today and start building your personal cybersecurity plan.
Visit www.hackproofyourlifenow.com for more details.
C. Checklist Continued
United States
Credit Reporting Agencies:Experian: 888-397-3742Equifax: 800-846-5279 TransUnion: 877-322-8228
FTC: 877-438-4338
Canada
Credit Reporting AgenciesEquifax Canada: 866-828-5961TransUnion Canada: 800-663-9980 Quebec Residents: 877-713-3393
Canadian Anti-Fraud Centre: 1-888-495-8501
Resources
Change this... To this... Example phrases made into passwords
At @ Run everyday Run3v3ryd@y
For 4 Eat more fruit 3@t>fru1t
To, Too, Two 2 Sleep at 11 $l33p@11pm
A 4 or @ Bring own lunch Br!ng0wnlunch!
E 3 No more soda N0m0r3s0d@
I 1 or ! Save for house $@v34h0u$3
O 0 Get outside G3t@0ut$!d3
Phishing � Learn how to unmask an email’s true sender on the display-name line. � Understand how to examine a message for the key signs of fraud. � Know how to inspect links in suspicious emails. � Recognize the danger of opening any unsolicited email attachment.
2 min2 min2 min2 min
Devices � Create passcodes for your smartphones and tablets. � Activate the Find My iPhone or Locate My Phone app in case your device becomes
lost or stolen. � Add your emergency contact information to your devices.
2 min1 min
1 min
Social Media
� Review and strengthen your social media privacy settings. � Reexamine your “friends” to ensure you’re still comfortable sharing with them.
10 min5 min
D. Action Plan
Password Letter to Symbol Conversion Chart
Securities and advisory services offered through LPL Financial, a Registered Investment Advisor, Member FINRA/SIPC.